Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home News

NIST CISA New Metric Predicts Exploit Risk

May 21, 2025
Reading Time: 3 mins read
in News
Teen Hacker Admits PowerSchool Cyberattack

Researchers from U.S. NIST and CISA have developed an important new security metric. This metric helps to determine the likelihood that a vulnerability has been exploited. A paper published this week by Peter Mell and Jonathan Spring outlined this metric. Their vulnerability exploit metric notably augments the existing Exploit Prediction Scoring System (EPSS). It also effectively builds upon CISA’S Known Exploited Vulnerabilities or KEV catalog. Studies show only about 5% of vulnerabilities are actually observed to be exploited. Yet the monthly vulnerability remediation rate for most companies currently stands at only 16%. Remediation is expensive so predicting exploitation is critically important for overall enterprise efficiency.

The researchers Mell and Spring noted some known shortcomings in both EPSS and KEV.

EPSS for example is known to have some inaccurate probability values for certain vulnerabilities. The CISA KEV catalog while useful is also likely not fully comprehensive in its listings. Their proposed new likelihood metric could help to augment EPSS based remediation efforts. It can achieve this by correcting some of these existing probability value inaccuracies. The metric could also build upon the KEV catalog by enabling comprehensiveness measurements. EPSS provides probabilities of exploitation within the next 30 days for known vulnerabilities. However its probabilities are often inaccurate for vulnerabilities previously observed to be exploited. Fortunately these probabilities are not randomly inaccurate as EPSS usually underestimates true probability. Mell and Spring call their new formula Likely Exploited Vulnerabilities or LEV probabilities.

These new LEV probabilities have at least four distinct and important potential use cases.

They can measure the expected number and proportion of vulnerabilities exploited by threat actors. They can also help to estimate the overall comprehensiveness of the existing KEV catalog. LEV augments KEV-based vulnerability remediation by identifying higher probability vulnerabilities possibly missing. It also augments EPSS-based prioritization by identifying vulnerabilities that may be currently underscored. The research paper listed two vulnerability examples where LEV and EPSS probabilities clearly differed. For CVE-2023-1730 a WordPress plugin flaw LEV probability was 0.70 while EPSS peaked at 0.16. For CVE-2023-29373 a Microsoft RCE flaw LEV was 0.54 while EPSS showed only 0.08. Their work also identified several hundred other vulnerabilities with a probability approaching 1.0.

Interestingly many of these high-probability vulnerabilities identified by LEV are not in KEV lists. This is one key reason that these new LEV lists cannot replace KEV lists. LEV cannot identify precisely which of many low probability vulnerabilities will actually be exploited. It can only help to compute how many of them are statistically expected to be exploited. KEV lists however identify the exact specific vulnerabilities that have already been exploited. Thus LEV provides a broader probabilistic view aiding in effective vulnerability remediation prioritization. Mell and Spring said they are now actively looking for various industry partners. They want to collaborate with these partners to obtain LEV metric performance measurements. This innovative new metric aims to significantly improve overall enterprise vulnerability management practices.

Reference:

  • NIST and CISA Develop New Metric To Predict Exploited Cybersecurity Vulnerabilities
Tags: Cyber NewsCyber News 2025Cyber threatsMay 2025
ADVERTISEMENT

Related Posts

North Korean Hackers Steal Crypto

Google Launches New AI Bug Bounty

October 10, 2025
North Korean Hackers Steal Crypto

DragonForce LockBit Qilin Dominate Ransomware

October 10, 2025
North Korean Hackers Steal Crypto

North Korean Hackers Steal Crypto

October 10, 2025
FBI Shuts Down BreachForums Portal

FBI Shuts Down BreachForums Portal

October 10, 2025
FBI Shuts Down BreachForums Portal

OpenAI Blocks Hackers Misusing ChatGPT

October 10, 2025
FBI Shuts Down BreachForums Portal

Defender Mistakenly Flags SQL Server

October 10, 2025

Latest Alerts

BatShadow Unleashes Go Vampire Bot

Hackers Exploit Service Finder Flaw

FileFix Attack Evades Security Tools

Hackers Abuse WordPress for Phishing

Severe Framelink Figma MCP Code Flaw

Android Spyware ClayRat Imitates Apps

Subscribe to our newsletter

    Latest Incidents

    Crimson Collective Hits AWS Instances

    GitHub Copilot Chat Flaw Leaks Repo Data

    Microsoft 365 Outage Hits Services

    Dozens Hit in Oracle-Linked Hacks

    BK Technologies Admits Cyber Breach

    Chinese Hackers Hit Williams Connolly

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial